EnterDll
adsfdsfg
retyrtuyrtuy
Static task
static1
Behavioral task
behavioral1
Sample
1.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Documents.lnk
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Documents.lnk
Resource
win10v2004-20240226-en
Target
8523aabf128e7b6d8a440422494a763a_JaffaCakes118
Size
416KB
MD5
8523aabf128e7b6d8a440422494a763a
SHA1
bcfe0aa7c8968e64e7aaf11532713eb71e903fc6
SHA256
878042c415ec1cb62d14e8b0f79fce6838e0813790546f7dd20eae65e9b9c8a2
SHA512
adfb6bd865712eec591ffe2d9613b8586ec8ca2a077406816ee7283be494ef46c647484ece5a2a8bcf46b2378d5ccc3375703ebba65d2ab99256609c73c66b1a
SSDEEP
6144:zM8CPvvwq0YslcteDNCfgQ/Fkp8HuubxwHdy/6E6OuUNkTf:+vvwTYslTMIQQubxTNkD
Checks for missing Authenticode signature.
resource |
---|
unpack002/1.dll |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PdhValidatePathW
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhCloseQuery
PdhRemoveCounter
PdhAddCounterW
PdhOpenQueryW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
MulDiv
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
SetLastError
DeleteCriticalSection
InitializeCriticalSectionEx
DecodePointer
DisableThreadLibraryCalls
SetStdHandle
GetStringTypeW
GetLastError
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapReAlloc
HeapSize
GetFileType
GetStdHandle
RaiseException
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
MultiByteToWideChar
FindClose
CloseHandle
CreateFileW
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
WriteFile
GetModuleHandleExW
GetConsoleOutputCP
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
GetConsoleMode
InterlockedFlushSList
RtlPcToFileHeader
RtlUnwindEx
LocalFree
WideCharToMultiByte
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
OutputDebugStringW
EncodePointer
HeapAlloc
HeapFree
GetProcessHeap
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
VirtualAlloc
VirtualFree
LoadLibraryExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
GetParent
CharNextW
CallWindowProcW
GetWindowLongPtrW
SetWindowLongPtrW
CreateWindowExW
DefWindowProcW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
SetTimer
ReleaseDC
GetDC
EndPaint
ClientToScreen
SendMessageW
LoadCursorW
BeginPaint
DrawTextW
InvalidateRect
InsertMenuW
GetClientRect
DestroyWindow
ShowWindow
IsWindow
DeleteDC
BitBlt
SetBkMode
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
SelectObject
SetTextColor
GetDeviceCaps
CreateFontW
GetTextMetricsW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
SHGetFolderPathW
ShellExecuteW
OleRun
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoInitialize
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
VarBstrCmp
VariantChangeType
VariantClear
VariantCopy
VariantInit
SysStringLen
SysAllocString
SysFreeString
EnterDll
adsfdsfg
retyrtuyrtuy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ